The following DLL report was generated by automatic DLL script that scanned and loaded all
DLL files in the system32 directory of Windows 7, extracted the information from them, and then
saved it into HTML reports.
If you want to view a report of another DLL, go to the main page of this Web site.

General Information

File Description:

Security Shell Extension

File Version:

6.1.7100.0 (winmain_win7rc.090421-1700)

Company:

Microsoft Corporation

Product Name:

Microsoft Windows Operating System

DLL popularity

Very Low - There is no any other DLL in system32 directory that is statically linked to this file.

Static Linking

This means that when rshx32.dll is loaded, the above files are automatically loaded too.
If one of these files is corrupted or missing, rshx32.dll won't be loaded.

General Resources Information

Resource Type

Number of Items

Total Size

% of File

Icons

0

0 Bytes

0.0%

Animated Icons

0

0 Bytes

0.0%

Cursors

0

0 Bytes

0.0%

Animated Cursors

0

0 Bytes

0.0%

Bitmaps

0

0 Bytes

0.0%

AVI Files

0

0 Bytes

0.0%

Dialog-Boxes

1

484 Bytes

1.1%

HTML Related Files

0

0 Bytes

0.0%

Menus

0

0 Bytes

0.0%

Strings

60

6,010 Bytes

14.0%

Type Libraries

0

0 Bytes

0.0%

Manifest

0

0 Bytes

0.0%

All Others

3

4,358 Bytes

10.1%

Total

64

10,852 Bytes

25.2%

Icons in this file

No icons found in this file

Cursors in this file

No cursors found in this file

Dialog-boxes list (up to 200 dialogs)

In the following section, you can find the captions of dialog-boxes stored in this DLL.
The list is currently limited to 200 dialogs.

ID

Dialog Caption

1

Error Applying Security

String resources in this dll (up to 200 strings)

String ID

String Text

2

Security

3

None

9

%1 (%2)

10

Unknown error (0x%1!08x!)

11

You do not have permission to read the contents of directory %1. Do you want to replace the directory permissions with permissions granting you Full Control?
All permissions will be replaced if you press Yes.

12

Changing ownership of:

13

Setting permissions on:

14

Setting audit information on:

15

Setting security information on:

16

Full control

17

Read

18

Write

19

Traverse / execute

20

Modify

21

Read, write & execute

22

Write & execute

23

Read & execute

24

List folder contents

32

Delete

33

Read permissions

34

Change permissions

35

Take ownership

36

Synchronize

38

List folder / read data

39

Create files / write data

40

Create folders / append data

41

Read extended attributes

42

Write extended attributes

43

Traverse folder / execute file

44

Delete subfolders and files

45

Read attributes

46

Write attributes

47

Create named pipe

48

This folder only

49

This folder, subfolders and files

50

This folder and subfolders

51

This folder and files

52

Subfolders and files only

53

Subfolders only

54

Files only

55

Remotely setting permissions on the folder at the root of a share removes all inherited permissions from the root folder and all subfolders. To set permissions without removing the inherited permissions, click No and either change the permissions on a child folder or make the change while logged in locally.
Do you want to continue?

56

Remotely setting auditing entries on the folder at the root of a share removes all inherited auditing entries from the root folder and all subfolders. To set auditing entries without removing the inherited auditing entries, click No and either change the auditing entries on a child folder or make the change while logged in locally.
Do you want to continue?

59

Permissions editor for files and folders

64

Print

65

Manage this printer

66

Manage documents

67

Delete

68

Read permissions

69

Change permissions

70

Take ownership

71

Full control

72

This printer only

73

Documents only

74

This printer and documents

82

Stopping the propagation of permission settings leads to an inconsistent state, in which some objects have the settings but others don't. If you made the change by mistake, you should apply the correct change immediately to achieve a consistent state.

83

Stopping the propagation of auditing settings leads to an inconsistent state, in which some objects have the settings but others don't. If you made the change by mistake, you should apply the correct change immediately to achieve a consistent state.

84

Stopping the propagation of the owner leads to an inconsistent state, in which some objects have the setting but others don't. If you made the change by mistake, you should apply the correct change immediately to achieve a consistent state.

85

You are about to change the permission settings on the root directory of the startup disk, which can result in unexpected access problems and reduce security. Do you want to continue?

86

You are about to change the permission settings on system folders, which can result in unexpected access problems and reduce security. Do you want to continue?

87

Windows Security

COM Classes/Interfaces

There is no type library in this file with COM classes/interfaces information